22 /
tcp
176160916 | 2025-12-13T17:36:53.300347
SSH-2.0-OpenSSH_8.9p1 Ubuntu-3ubuntu0.13
Key type: ecdsa-sha2-nistp256
Key: AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBHgDcsAVPyn78iYNVzn4ZjPo
3nY5yVRZ8Cqy4l/9K8mRpylPBntBvUsyUmf2S3rtFk+gycp+B3aq7btF1X2xrUo=
Fingerprint: 41:d0:6e:24:5f:c5:07:53:8b:c2:0c:e2:60:d9:9f:66
Kex Algorithms:
curve25519-sha256
curve25519-sha256@libssh.org
ecdh-sha2-nistp256
ecdh-sha2-nistp384
ecdh-sha2-nistp521
sntrup761x25519-sha512@openssh.com
diffie-hellman-group-exchange-sha256
diffie-hellman-group16-sha512
diffie-hellman-group18-sha512
diffie-hellman-group14-sha256
kex-strict-s-v00@openssh.com
Server Host Key Algorithms:
rsa-sha2-512
rsa-sha2-256
ecdsa-sha2-nistp256
ssh-ed25519
Encryption Algorithms:
chacha20-poly1305@openssh.com
aes128-ctr
aes192-ctr
aes256-ctr
aes128-gcm@openssh.com
aes256-gcm@openssh.com
MAC Algorithms:
umac-64-etm@openssh.com
umac-128-etm@openssh.com
hmac-sha2-256-etm@openssh.com
hmac-sha2-512-etm@openssh.com
hmac-sha1-etm@openssh.com
umac-64@openssh.com
umac-128@openssh.com
hmac-sha2-256
hmac-sha2-512
hmac-sha1
Compression Algorithms:
none
zlib@openssh.com
25 /
tcp
1736516195 | 2025-12-12T14:23:22.383920
220 mail.mpache.com ESMTP ready
250-mail.mpache.com
250-PIPELINING
250-SIZE 50000000
250-ETRN
250-ENHANCEDSTATUSCODES
250-8BITMIME
250-DSN
250 STARTTLS
SSL Certificate
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
05:b8:13:62:53:4e:09:10:39:0b:15:4e:ea:2e:5c:81:73:6c
Signature Algorithm: ecdsa-with-SHA384
Issuer: C=US, O=Let's Encrypt, CN=E7
Validity
Not Before: Oct 22 14:39:01 2025 GMT
Not After : Jan 20 14:39:00 2026 GMT
Subject: CN=mail.mpache.com
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (256 bit)
pub:
04:60:2e:62:7a:c3:95:bf:b9:8f:99:1f:88:d8:69:
c6:32:10:e2:ec:bd:f4:73:d3:4b:4c:f1:3a:4c:3b:
a4:0f:e7:d7:43:4b:27:9f:26:c3:68:f8:79:ed:72:
8b:66:27:e7:1f:da:32:e3:7c:65:29:f6:d4:3c:3e:
a4:2c:65:b9:a6
ASN1 OID: prime256v1
NIST CURVE: P-256
X509v3 extensions:
X509v3 Key Usage: critical
Digital Signature
X509v3 Extended Key Usage:
TLS Web Server Authentication, TLS Web Client Authentication
X509v3 Basic Constraints: critical
CA:FALSE
X509v3 Subject Key Identifier:
C1:1E:DE:AE:3C:61:8D:B8:A6:22:40:32:65:B9:8B:E9:B5:4E:02:FC
X509v3 Authority Key Identifier:
AE:48:9E:DC:87:1D:44:A0:6F:DA:A2:E5:60:74:04:78:C2:9C:00:80
Authority Information Access:
CA Issuers - URI:http://e7.i.lencr.org/
X509v3 Subject Alternative Name:
DNS:mail.mpache.com
X509v3 Certificate Policies:
Policy: 2.23.140.1.2.1
X509v3 CRL Distribution Points:
Full Name:
URI:http://e7.c.lencr.org/109.crl
CT Precertificate SCTs:
Signed Certificate Timestamp:
Version : v1 (0x0)
Log ID : 64:11:C4:6C:A4:12:EC:A7:89:1C:A2:02:2E:00:BC:AB:
4F:28:07:D4:1E:35:27:AB:EA:FE:D5:03:C9:7D:CD:F0
Timestamp : Oct 22 15:37:31.613 2025 GMT
Extensions: none
Signature : ecdsa-with-SHA256
30:45:02:21:00:C6:78:EE:D8:33:DA:70:7C:0F:6E:77:
51:F9:15:CB:7F:29:95:96:70:C3:34:58:35:45:54:3E:
56:DE:17:11:9D:02:20:41:4E:22:DC:35:A4:DE:F3:C4:
4A:BD:88:5D:93:37:B5:C9:7F:EE:9E:1D:3D:8B:25:56:
AF:B0:51:5B:CC:EB:DC
Signed Certificate Timestamp:
Version : v1 (0x0)
Log ID : 0E:57:94:BC:F3:AE:A9:3E:33:1B:2C:99:07:B3:F7:90:
DF:9B:C2:3D:71:32:25:DD:21:A9:25:AC:61:C5:4E:21
Timestamp : Oct 22 15:37:31.614 2025 GMT
Extensions: none
Signature : ecdsa-with-SHA256
30:45:02:21:00:95:7C:23:30:68:F9:70:3C:9B:41:25:
59:D2:76:4F:B9:7B:16:99:25:2D:17:38:25:AA:87:F1:
2F:F1:F3:EF:16:02:20:76:55:01:1D:3D:DE:DF:AF:F3:
BB:47:45:91:21:AB:A3:69:2D:E2:0A:A2:F0:E3:2B:5B:
85:AE:A6:18:E9:E9:06
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:a5:50:e9:ee:a9:0f:ac:3a:ee:65:1b:46:8f:
18:8e:1f:d3:12:ed:de:eb:33:30:1c:91:7d:58:4e:3f:0f:9b:
03:25:4d:60:96:7b:cc:34:58:5b:48:52:1c:2c:bf:b3:b4:02:
30:09:2e:82:c7:93:bd:33:6f:42:38:f6:0f:8b:57:54:65:12:
8c:54:f1:a0:c3:77:8b:ad:8f:ef:2b:16:35:16:2d:4c:45:14:
97:6a:65:c2:21:11:dc:f6:55:f8:cf:c8:3d
-2100514759 | 2025-12-15T09:07:21.217506
HTTP/1.1 301 Moved Permanently
Server: nginx
Date: Mon, 15 Dec 2025 09:07:21 GMT
Content-Type: text/html
Content-Length: 162
Connection: keep-alive
Location: https://5.45.102.201/
778573149 | 2025-12-16T09:01:53.478881
HTTP/1.1 200 OK
Server: nginx
Date: Tue, 16 Dec 2025 09:01:53 GMT
Content-Type: text/html; charset=utf-8
Content-Length: 7260
Connection: keep-alive
Strict-Transport-Security: max-age=31536000
X-Frame-Options: SAMEORIGIN
X-Content-Type-Options: nosniff
X-Permitted-Cross-Domain-Policies: none
Referrer-Policy: same-origin
SSL Certificate
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
05:b8:13:62:53:4e:09:10:39:0b:15:4e:ea:2e:5c:81:73:6c
Signature Algorithm: ecdsa-with-SHA384
Issuer: C=US, O=Let's Encrypt, CN=E7
Validity
Not Before: Oct 22 14:39:01 2025 GMT
Not After : Jan 20 14:39:00 2026 GMT
Subject: CN=mail.mpache.com
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (256 bit)
pub:
04:60:2e:62:7a:c3:95:bf:b9:8f:99:1f:88:d8:69:
c6:32:10:e2:ec:bd:f4:73:d3:4b:4c:f1:3a:4c:3b:
a4:0f:e7:d7:43:4b:27:9f:26:c3:68:f8:79:ed:72:
8b:66:27:e7:1f:da:32:e3:7c:65:29:f6:d4:3c:3e:
a4:2c:65:b9:a6
ASN1 OID: prime256v1
NIST CURVE: P-256
X509v3 extensions:
X509v3 Key Usage: critical
Digital Signature
X509v3 Extended Key Usage:
TLS Web Server Authentication, TLS Web Client Authentication
X509v3 Basic Constraints: critical
CA:FALSE
X509v3 Subject Key Identifier:
C1:1E:DE:AE:3C:61:8D:B8:A6:22:40:32:65:B9:8B:E9:B5:4E:02:FC
X509v3 Authority Key Identifier:
AE:48:9E:DC:87:1D:44:A0:6F:DA:A2:E5:60:74:04:78:C2:9C:00:80
Authority Information Access:
CA Issuers - URI:http://e7.i.lencr.org/
X509v3 Subject Alternative Name:
DNS:mail.mpache.com
X509v3 Certificate Policies:
Policy: 2.23.140.1.2.1
X509v3 CRL Distribution Points:
Full Name:
URI:http://e7.c.lencr.org/109.crl
CT Precertificate SCTs:
Signed Certificate Timestamp:
Version : v1 (0x0)
Log ID : 64:11:C4:6C:A4:12:EC:A7:89:1C:A2:02:2E:00:BC:AB:
4F:28:07:D4:1E:35:27:AB:EA:FE:D5:03:C9:7D:CD:F0
Timestamp : Oct 22 15:37:31.613 2025 GMT
Extensions: none
Signature : ecdsa-with-SHA256
30:45:02:21:00:C6:78:EE:D8:33:DA:70:7C:0F:6E:77:
51:F9:15:CB:7F:29:95:96:70:C3:34:58:35:45:54:3E:
56:DE:17:11:9D:02:20:41:4E:22:DC:35:A4:DE:F3:C4:
4A:BD:88:5D:93:37:B5:C9:7F:EE:9E:1D:3D:8B:25:56:
AF:B0:51:5B:CC:EB:DC
Signed Certificate Timestamp:
Version : v1 (0x0)
Log ID : 0E:57:94:BC:F3:AE:A9:3E:33:1B:2C:99:07:B3:F7:90:
DF:9B:C2:3D:71:32:25:DD:21:A9:25:AC:61:C5:4E:21
Timestamp : Oct 22 15:37:31.614 2025 GMT
Extensions: none
Signature : ecdsa-with-SHA256
30:45:02:21:00:95:7C:23:30:68:F9:70:3C:9B:41:25:
59:D2:76:4F:B9:7B:16:99:25:2D:17:38:25:AA:87:F1:
2F:F1:F3:EF:16:02:20:76:55:01:1D:3D:DE:DF:AF:F3:
BB:47:45:91:21:AB:A3:69:2D:E2:0A:A2:F0:E3:2B:5B:
85:AE:A6:18:E9:E9:06
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:a5:50:e9:ee:a9:0f:ac:3a:ee:65:1b:46:8f:
18:8e:1f:d3:12:ed:de:eb:33:30:1c:91:7d:58:4e:3f:0f:9b:
03:25:4d:60:96:7b:cc:34:58:5b:48:52:1c:2c:bf:b3:b4:02:
30:09:2e:82:c7:93:bd:33:6f:42:38:f6:0f:8b:57:54:65:12:
8c:54:f1:a0:c3:77:8b:ad:8f:ef:2b:16:35:16:2d:4c:45:14:
97:6a:65:c2:21:11:dc:f6:55:f8:cf:c8:3d
465 /
tcp
-2004885059 | 2025-11-29T12:48:23.691200
220 mail.mpache.com Dovecot ready.
250-mail.mpache.com
250-8BITMIME
250-AUTH PLAIN LOGIN
250-BURL imap
250-CHUNKING
250-DSN
250-ENHANCEDSTATUSCODES
250-SIZE 50000000
250-PIPELINING
250 VRFY
SSL Certificate
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
05:b8:13:62:53:4e:09:10:39:0b:15:4e:ea:2e:5c:81:73:6c
Signature Algorithm: ecdsa-with-SHA384
Issuer: C=US, O=Let's Encrypt, CN=E7
Validity
Not Before: Oct 22 14:39:01 2025 GMT
Not After : Jan 20 14:39:00 2026 GMT
Subject: CN=mail.mpache.com
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (256 bit)
pub:
04:60:2e:62:7a:c3:95:bf:b9:8f:99:1f:88:d8:69:
c6:32:10:e2:ec:bd:f4:73:d3:4b:4c:f1:3a:4c:3b:
a4:0f:e7:d7:43:4b:27:9f:26:c3:68:f8:79:ed:72:
8b:66:27:e7:1f:da:32:e3:7c:65:29:f6:d4:3c:3e:
a4:2c:65:b9:a6
ASN1 OID: prime256v1
NIST CURVE: P-256
X509v3 extensions:
X509v3 Key Usage: critical
Digital Signature
X509v3 Extended Key Usage:
TLS Web Server Authentication, TLS Web Client Authentication
X509v3 Basic Constraints: critical
CA:FALSE
X509v3 Subject Key Identifier:
C1:1E:DE:AE:3C:61:8D:B8:A6:22:40:32:65:B9:8B:E9:B5:4E:02:FC
X509v3 Authority Key Identifier:
AE:48:9E:DC:87:1D:44:A0:6F:DA:A2:E5:60:74:04:78:C2:9C:00:80
Authority Information Access:
CA Issuers - URI:http://e7.i.lencr.org/
X509v3 Subject Alternative Name:
DNS:mail.mpache.com
X509v3 Certificate Policies:
Policy: 2.23.140.1.2.1
X509v3 CRL Distribution Points:
Full Name:
URI:http://e7.c.lencr.org/109.crl
CT Precertificate SCTs:
Signed Certificate Timestamp:
Version : v1 (0x0)
Log ID : 64:11:C4:6C:A4:12:EC:A7:89:1C:A2:02:2E:00:BC:AB:
4F:28:07:D4:1E:35:27:AB:EA:FE:D5:03:C9:7D:CD:F0
Timestamp : Oct 22 15:37:31.613 2025 GMT
Extensions: none
Signature : ecdsa-with-SHA256
30:45:02:21:00:C6:78:EE:D8:33:DA:70:7C:0F:6E:77:
51:F9:15:CB:7F:29:95:96:70:C3:34:58:35:45:54:3E:
56:DE:17:11:9D:02:20:41:4E:22:DC:35:A4:DE:F3:C4:
4A:BD:88:5D:93:37:B5:C9:7F:EE:9E:1D:3D:8B:25:56:
AF:B0:51:5B:CC:EB:DC
Signed Certificate Timestamp:
Version : v1 (0x0)
Log ID : 0E:57:94:BC:F3:AE:A9:3E:33:1B:2C:99:07:B3:F7:90:
DF:9B:C2:3D:71:32:25:DD:21:A9:25:AC:61:C5:4E:21
Timestamp : Oct 22 15:37:31.614 2025 GMT
Extensions: none
Signature : ecdsa-with-SHA256
30:45:02:21:00:95:7C:23:30:68:F9:70:3C:9B:41:25:
59:D2:76:4F:B9:7B:16:99:25:2D:17:38:25:AA:87:F1:
2F:F1:F3:EF:16:02:20:76:55:01:1D:3D:DE:DF:AF:F3:
BB:47:45:91:21:AB:A3:69:2D:E2:0A:A2:F0:E3:2B:5B:
85:AE:A6:18:E9:E9:06
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:a5:50:e9:ee:a9:0f:ac:3a:ee:65:1b:46:8f:
18:8e:1f:d3:12:ed:de:eb:33:30:1c:91:7d:58:4e:3f:0f:9b:
03:25:4d:60:96:7b:cc:34:58:5b:48:52:1c:2c:bf:b3:b4:02:
30:09:2e:82:c7:93:bd:33:6f:42:38:f6:0f:8b:57:54:65:12:
8c:54:f1:a0:c3:77:8b:ad:8f:ef:2b:16:35:16:2d:4c:45:14:
97:6a:65:c2:21:11:dc:f6:55:f8:cf:c8:3d
993 /
tcp
1505986360 | 2025-12-03T17:08:32.987774
* OK [CAPABILITY IMAP4rev1 SASL-IR LOGIN-REFERRALS ID ENABLE IDLE LITERAL+ AUTH=PLAIN AUTH=LOGIN] Dovecot ready.
* CAPABILITY IMAP4rev1 SASL-IR LOGIN-REFERRALS ID ENABLE IDLE LITERAL+ AUTH=PLAIN AUTH=LOGIN
A001 OK Pre-login capabilities listed, post-login capabilities have more.
* ID ("name" "Dovecot")
A002 OK ID completed.
A003 BAD Error in IMAP command received by server.
* BYE Logging out
A004 OK Logout completed.
SSL Certificate
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
05:b8:13:62:53:4e:09:10:39:0b:15:4e:ea:2e:5c:81:73:6c
Signature Algorithm: ecdsa-with-SHA384
Issuer: C=US, O=Let's Encrypt, CN=E7
Validity
Not Before: Oct 22 14:39:01 2025 GMT
Not After : Jan 20 14:39:00 2026 GMT
Subject: CN=mail.mpache.com
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (256 bit)
pub:
04:60:2e:62:7a:c3:95:bf:b9:8f:99:1f:88:d8:69:
c6:32:10:e2:ec:bd:f4:73:d3:4b:4c:f1:3a:4c:3b:
a4:0f:e7:d7:43:4b:27:9f:26:c3:68:f8:79:ed:72:
8b:66:27:e7:1f:da:32:e3:7c:65:29:f6:d4:3c:3e:
a4:2c:65:b9:a6
ASN1 OID: prime256v1
NIST CURVE: P-256
X509v3 extensions:
X509v3 Key Usage: critical
Digital Signature
X509v3 Extended Key Usage:
TLS Web Server Authentication, TLS Web Client Authentication
X509v3 Basic Constraints: critical
CA:FALSE
X509v3 Subject Key Identifier:
C1:1E:DE:AE:3C:61:8D:B8:A6:22:40:32:65:B9:8B:E9:B5:4E:02:FC
X509v3 Authority Key Identifier:
AE:48:9E:DC:87:1D:44:A0:6F:DA:A2:E5:60:74:04:78:C2:9C:00:80
Authority Information Access:
CA Issuers - URI:http://e7.i.lencr.org/
X509v3 Subject Alternative Name:
DNS:mail.mpache.com
X509v3 Certificate Policies:
Policy: 2.23.140.1.2.1
X509v3 CRL Distribution Points:
Full Name:
URI:http://e7.c.lencr.org/109.crl
CT Precertificate SCTs:
Signed Certificate Timestamp:
Version : v1 (0x0)
Log ID : 64:11:C4:6C:A4:12:EC:A7:89:1C:A2:02:2E:00:BC:AB:
4F:28:07:D4:1E:35:27:AB:EA:FE:D5:03:C9:7D:CD:F0
Timestamp : Oct 22 15:37:31.613 2025 GMT
Extensions: none
Signature : ecdsa-with-SHA256
30:45:02:21:00:C6:78:EE:D8:33:DA:70:7C:0F:6E:77:
51:F9:15:CB:7F:29:95:96:70:C3:34:58:35:45:54:3E:
56:DE:17:11:9D:02:20:41:4E:22:DC:35:A4:DE:F3:C4:
4A:BD:88:5D:93:37:B5:C9:7F:EE:9E:1D:3D:8B:25:56:
AF:B0:51:5B:CC:EB:DC
Signed Certificate Timestamp:
Version : v1 (0x0)
Log ID : 0E:57:94:BC:F3:AE:A9:3E:33:1B:2C:99:07:B3:F7:90:
DF:9B:C2:3D:71:32:25:DD:21:A9:25:AC:61:C5:4E:21
Timestamp : Oct 22 15:37:31.614 2025 GMT
Extensions: none
Signature : ecdsa-with-SHA256
30:45:02:21:00:95:7C:23:30:68:F9:70:3C:9B:41:25:
59:D2:76:4F:B9:7B:16:99:25:2D:17:38:25:AA:87:F1:
2F:F1:F3:EF:16:02:20:76:55:01:1D:3D:DE:DF:AF:F3:
BB:47:45:91:21:AB:A3:69:2D:E2:0A:A2:F0:E3:2B:5B:
85:AE:A6:18:E9:E9:06
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:a5:50:e9:ee:a9:0f:ac:3a:ee:65:1b:46:8f:
18:8e:1f:d3:12:ed:de:eb:33:30:1c:91:7d:58:4e:3f:0f:9b:
03:25:4d:60:96:7b:cc:34:58:5b:48:52:1c:2c:bf:b3:b4:02:
30:09:2e:82:c7:93:bd:33:6f:42:38:f6:0f:8b:57:54:65:12:
8c:54:f1:a0:c3:77:8b:ad:8f:ef:2b:16:35:16:2d:4c:45:14:
97:6a:65:c2:21:11:dc:f6:55:f8:cf:c8:3d
995 /
tcp
-1001764030 | 2025-12-15T04:07:31.725796
+OK Dovecot ready.
+OK
CAPA
TOP
UIDL
RESP-CODES
PIPELINING
AUTH-RESP-CODE
USER
SASL PLAIN LOGIN
.
SSL Certificate
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
05:b8:13:62:53:4e:09:10:39:0b:15:4e:ea:2e:5c:81:73:6c
Signature Algorithm: ecdsa-with-SHA384
Issuer: C=US, O=Let's Encrypt, CN=E7
Validity
Not Before: Oct 22 14:39:01 2025 GMT
Not After : Jan 20 14:39:00 2026 GMT
Subject: CN=mail.mpache.com
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (256 bit)
pub:
04:60:2e:62:7a:c3:95:bf:b9:8f:99:1f:88:d8:69:
c6:32:10:e2:ec:bd:f4:73:d3:4b:4c:f1:3a:4c:3b:
a4:0f:e7:d7:43:4b:27:9f:26:c3:68:f8:79:ed:72:
8b:66:27:e7:1f:da:32:e3:7c:65:29:f6:d4:3c:3e:
a4:2c:65:b9:a6
ASN1 OID: prime256v1
NIST CURVE: P-256
X509v3 extensions:
X509v3 Key Usage: critical
Digital Signature
X509v3 Extended Key Usage:
TLS Web Server Authentication, TLS Web Client Authentication
X509v3 Basic Constraints: critical
CA:FALSE
X509v3 Subject Key Identifier:
C1:1E:DE:AE:3C:61:8D:B8:A6:22:40:32:65:B9:8B:E9:B5:4E:02:FC
X509v3 Authority Key Identifier:
AE:48:9E:DC:87:1D:44:A0:6F:DA:A2:E5:60:74:04:78:C2:9C:00:80
Authority Information Access:
CA Issuers - URI:http://e7.i.lencr.org/
X509v3 Subject Alternative Name:
DNS:mail.mpache.com
X509v3 Certificate Policies:
Policy: 2.23.140.1.2.1
X509v3 CRL Distribution Points:
Full Name:
URI:http://e7.c.lencr.org/109.crl
CT Precertificate SCTs:
Signed Certificate Timestamp:
Version : v1 (0x0)
Log ID : 64:11:C4:6C:A4:12:EC:A7:89:1C:A2:02:2E:00:BC:AB:
4F:28:07:D4:1E:35:27:AB:EA:FE:D5:03:C9:7D:CD:F0
Timestamp : Oct 22 15:37:31.613 2025 GMT
Extensions: none
Signature : ecdsa-with-SHA256
30:45:02:21:00:C6:78:EE:D8:33:DA:70:7C:0F:6E:77:
51:F9:15:CB:7F:29:95:96:70:C3:34:58:35:45:54:3E:
56:DE:17:11:9D:02:20:41:4E:22:DC:35:A4:DE:F3:C4:
4A:BD:88:5D:93:37:B5:C9:7F:EE:9E:1D:3D:8B:25:56:
AF:B0:51:5B:CC:EB:DC
Signed Certificate Timestamp:
Version : v1 (0x0)
Log ID : 0E:57:94:BC:F3:AE:A9:3E:33:1B:2C:99:07:B3:F7:90:
DF:9B:C2:3D:71:32:25:DD:21:A9:25:AC:61:C5:4E:21
Timestamp : Oct 22 15:37:31.614 2025 GMT
Extensions: none
Signature : ecdsa-with-SHA256
30:45:02:21:00:95:7C:23:30:68:F9:70:3C:9B:41:25:
59:D2:76:4F:B9:7B:16:99:25:2D:17:38:25:AA:87:F1:
2F:F1:F3:EF:16:02:20:76:55:01:1D:3D:DE:DF:AF:F3:
BB:47:45:91:21:AB:A3:69:2D:E2:0A:A2:F0:E3:2B:5B:
85:AE:A6:18:E9:E9:06
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:a5:50:e9:ee:a9:0f:ac:3a:ee:65:1b:46:8f:
18:8e:1f:d3:12:ed:de:eb:33:30:1c:91:7d:58:4e:3f:0f:9b:
03:25:4d:60:96:7b:cc:34:58:5b:48:52:1c:2c:bf:b3:b4:02:
30:09:2e:82:c7:93:bd:33:6f:42:38:f6:0f:8b:57:54:65:12:
8c:54:f1:a0:c3:77:8b:ad:8f:ef:2b:16:35:16:2d:4c:45:14:
97:6a:65:c2:21:11:dc:f6:55:f8:cf:c8:3d
4190 /
tcp
-1687938210 | 2025-12-16T11:48:27.835594
"IMPLEMENTATION" "Dovecot Pigeonhole"\r\n"SIEVE" "fileinto reject envelope encoded-character vacation subaddress comparator-i;ascii-numeric relational regex imap4flags copy include variables body enotify environment mailbox date index ihave duplicate mime foreverypart extracttext"\r\n"NOTIFY" "mailto"\r\n"SASL" ""\r\n"STARTTLS"\r\n"VERSION" "1.0"\r\nOK "Dovecot ready."\r\n